Heuristic methods of gradient search for the cryptographic boolean functions

被引:0
|
作者
Kuznetsov A.A. [1 ]
Moskovchenko I.V. [2 ]
Prokopovych-Tkachenko D.I. [3 ]
Kuznetsova T.Y. [3 ]
机构
[1] V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv
[2] University of Customs and Finance, 2/4Volodymyra Vernadskoho St., Dnipro
[3] I. Kozhedub Kharkiv National Air Force University, 77/79 Sumska St., Kharkiv
关键词
Cryptographic Boolean functions; Heuristic methods; Nonlinear substitute blocks; Symmetric cryptography;
D O I
10.1615/TelecomRadEng.v78.i10.40
中图分类号
学科分类号
摘要
Heuristic methods of gradient search of the cryptographic Boolean functions that satisfy the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. The proposed method of gradient descent is investigated, in particular, estimates of nonlinearity and correlation immunity of the synthesized Boolean functions are given. A method for evaluating the computational efficiency of gradient search methods is proposed, based on the construction of sample (empirical) distribution functions, which characterize the probability of the formation of the Boolean functions with persistence indicators not lower than those required. As an indicator of computational efficiency, we propose the average number of attempts that need to be performed using the heuristic method to form a cryptographic Boolean function with the required properties. It is shown that the proposed gradient descent method allows the formation of cryptographic functions with the required durability indicators in fewer steps. The results of investigations of the cryptographic properties of the formed Boolean functions in comparison with the best known assessments are given. © 2019 Begell House Inc.. All rights reserved.
引用
收藏
页码:879 / 899
页数:20
相关论文
共 50 条
  • [1] Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions
    Moskovchenko, Illarion
    Pastukhov, Mykola
    Kuznetsov, Alexandr
    Kuznetsova, Tetiana
    Prokopenko, Valeriia
    Kropyvnytskyi, Vitaliy
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 503 - 508
  • [2] Evolutionary Methods for the Construction of Cryptographic Boolean Functions
    Picek, Stjepan
    Jakobovic, Domagoj
    Miller, Julian F.
    Marchiori, Elena
    Batina, Lejla
    GENETIC PROGRAMMING (EUROGP 2015), 2015, 9025 : 192 - 204
  • [3] Comparison of Genetic Programming Methods on Design of Cryptographic Boolean Functions
    Husa, Jakub
    GENETIC PROGRAMMING, EUROGP 2019, 2019, 11451 : 228 - 244
  • [4] On cryptographic complexity of Boolean functions
    Carlet, C
    FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, : 53 - 69
  • [5] On the annihilators of cryptographic Boolean functions
    State Key Lab. of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Tien Tzu Hsueh Pao, 2006, 1 (51-54):
  • [6] Cryptographic Boolean Functions and Applications
    Joyner, David
    CRYPTOLOGIA, 2013, 37 (02) : 189 - 192
  • [7] Cryptographic Boolean Functions with R
    Lafitte, Frederic
    Van Heule, Dirk
    Van Hamme, Julien
    R JOURNAL, 2011, 3 (01): : 44 - 47
  • [8] Metaheuristics in the Optimization of Cryptographic Boolean Functions
    Lopez-Lopez, Isaac
    Sosa-Gomez, Guillermo
    Segura, Carlos
    Oliva, Diego
    Rojas, Omar
    ENTROPY, 2020, 22 (09)
  • [9] Cryptographic Boolean functions with biased inputs
    Gangopadhyay, Sugata
    Gangopadhyay, Aditi Kar
    Pollatos, Spyridon
    Stanica, Pantelimon
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (02): : 301 - 314
  • [10] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149